Short CV/Education and training

  • 2003
    PhD of the Ecole Normale Superieure de Cachan

  • 2003
    Junior researcher at CNRS

  • 2007
    Senior reseacher at CNRS

  • 2010
    Research director at CNRS

  • 2011 – 2016
    Grantee of the ERC Staring Grant ProSecure

Selected publications

  • Some Journals:

  • YAPA: A generic tool for computing intruder knowledge. Mathieu Baudet, Véronique Cortier, and Stéphanie Delaune. ACM Transactions on Computational Logic, ACM Press, 2012. to appear.

  • Decidability and combination results for two notions of knowledge in security protocols. Véronique Cortier and Stéphanie Delaune. Journal of Automated Reasoning, Springer, 2012. To appear.

  • Deciding security properties for cryptographic protocols. Application to key cycles. Hubert Comon-Lundh, Véronique Cortier, and Eugen Zalinescu. ACM Transactions on Computational Logic, 11(2), ACM Press, January 2010.

  • A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. Véronique Cortier, Steve Kremer, and Bogdan Warinschi. Journal of Automated Reasoning, 46(3-4):225?259, Springer, April 2010.

  • Computationally Sound Implementations of Equational Theories against Passive Adversaries. Mathieu Baudet, Véronique Cortier, and Steve Kremer. Information and Computation, 207(4):496?520, Elsevier Science Publishers, April 2009.

  • Safely Composing Security Protocols. Véronique Cortier and Stéphanie Delaune. Formal Methods in System Design, 34(1):1?36, Kluwer Academic Publishers, February 2009.

Some conferences:

  • How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. Hubert Comon-Lundh and Véronique Cortier. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), pp. 29?44, Leibniz International Proceedings in Informatics 9, Leibniz-Zentrum für Informatik, Dortmund, Germany, March 2011.

  • A Composable Computational Soundness Notion. Véronique Cortier and Bogdan Warinschi. In 18th ACM Conference on Computer and Communications Security (CCS'11), Chicago, USA, October 2011.

  • Attacking and fixing Helios: An analysis of ballot secrecy. Véronique Cortier and Ben Smyth. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), IEEE Computer Society Press, June 2011.

  • Modeling and Verifying Ad Hoc Routing Protocols. Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pp. 59?74, IEEE Computer Society Press, Edinburgh, Scotland, UK, July 2010.

  • Protocol composition for arbitrary primitives. Sefan Ciobâca; and Véronique Cortier. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pp. 322?336, IEEE Computer Society Press, Edinburgh, Scotland, UK, July 2010.

  • Computational Soundness of Observational Equivalence. Hubert Comon-Lundh and Véronique Cortier. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pp. 109?118, ACM Press, Alexandria, Virginia, USA, October 2008.



Complete list of publications

Selected projects

  • ERC Staring Grant ProSecure, 2011 – 2016

  • ANR (French Founding Agency in Research) project AVOTE, 2008 – 2011

Membership in scientific bodies/juries

  • Member of the hiring committee of the INRIA (French National Institute in Computer Science)

  • Member of hiring committees for Professor and Assistant Professor each year

  • Member of the editorial board of the Journal of Computer Security (JCS)

  • Member of several Program Committees every year (CSF, CCS, TACAS, FSTTCS, POST, Esorics, RTA, ...), chair of CSF 2012 and CSF 2013

Contact

You can only see the contact information of the academics in the database if you are a registered user of AcademiaNet.
Please register here

Testimonials

  1. Read what our members say about AcademiaNet.

No more excuses!

  1. Please download the brochure "No more excuses" and read more about female experts in Europe, and about AcademiaNet.

Similar profiles

  1. Prof. Dr. Susanne Biundo-Stephan

    Information and Communication Technologies (ICTs)Artificial Intelligence

  2. Prof. Ana Cavalcanti

    Information and Communication Technologies (ICTs)Software Engineering

  3. Dr. Dajana Cassioli

    Engineering and engineering trades , Information and Communication Technologies (ICTs)Wireless Communications

  4. Prof. Dr. Barbara Caputo

    Information and Communication Technologies (ICTs)computer vision, machine learning, robot vision, multimodal applied learning